The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CyCom"( http://dblp.L3S.de/Venues/CyCom )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cycon

Publication years (Num. hits)
2022 (23)
Publication types (Num. hits)
inproceedings(23)
Venues (Conferences, Journals, ...)
CyCom(23)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Keir Giles, Kim Hartmann Emergence of 5G Networks and Implications for Cyber Conflict. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Seth W. Dilworth, D. Daniel Osborne Cyber Threats Against and in the Space Domain: Legal Remedies. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sampath Rajapaksha, Harsha K. Kalutarage, M. Omar Al-Kadri, Garikayi Madzudzo, Andrei V. Petrovski Keep the Moving Vehicle Secure: Context-Aware Intrusion Detection System for In-Vehicle CAN Bus Security. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1John Morgan Salomon Public-Private Partnerships and Collective Cyber Defence. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Emre Halisdemir, Hacer Karacan, Mauno Pihelgas, Toomas Lepik, Sungbaek Cho Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Joseph A. J. Ross, Kimberly Tam, David J. Walker, Kevin D. Jones Towards a Digital Twin of a Complex Maritime Site for Multi-Objective Optimization. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Christopher Molloy, Philippe Charland, Steven H. H. Ding, Benjamin C. M. Fung JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Miguel Alberto Gomez, Gregory Winger Third-Party Countries in Cyber Conflict: Understanding the Dynamics of Public Opinion Following Offensive Cyber Operations. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lennart Maschmeyer Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of Exploitation. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Georg Baselt, Martin Strohmeier, James Pavur, Vincent Lenders, Ivan Martinovic Security and Privacy Issues of Satellite Communication in the Avlatlon Domain. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Siddhant Shrivastava, Francisco Furtado, Mark Goh, Aditya Mathur The Design of Cyber-Physical Exercises (CPXS). Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Sebastian Cymutta, Marten Zwanenburg, Paul Oling Military Data and Information Sharing - a European Union Perspective. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Christopher E. Whyte Machine Expertise in the Loop: Artificial Intelligence Decision-Making Inputs and Cyber Conflict. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Max Smeets The Role of Military Cyber Exercises: A Case Study of Locked Shields. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Arun Mohan Sukumar 'Responsibility to Detect?': Autonomous Threat Detection and its Implications for Due Diligence in Cyberspace. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Erica D. Lonergan, Mark Montgomery The Promise and Perils of Allied Offensive Cyber Operations. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Mikko Kiviharju, Christina Lassfolk, Sanna Rikkonen, Hannu H. Kari A Cryptographic and Key Management Glance at Cybersecurity Challenges of the Future European Railway System. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Michael Bátrla, Jakub Harasta 'Releasing the Hounds?'1 Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Michael L. Thomas Maritime Hacking Using Land-Based Skills. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Petr Stejskal, Martin Faix Legal Aspects of Misattribution Caused by Cyber Deception. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Lee A. Bygrave Cyber Resilience versus Cybersecurity as Legal Aspiration. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Martin C. Libicki Obnoxious Deterrence. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Tsvetelina J. van Benthem Exploring Changing Battlefields: Autonomous Weapons, Unintended Engagements and the Law of Armed Conflict. Search on Bibsonomy CyCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #23 of 23 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license